Yesol Kim

Orcid: 0000-0002-8780-1315

According to our database1, Yesol Kim authored at least 14 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Real-Time Detection of Electric Field Signal of a Moving Object Using Adjustable Frequency Bands and Statistical Discriminant for Underwater Defense.
IEEE Trans. Geosci. Remote. Sens., 2022

Mobile health platform based on user-centered design to promote exercise for patients with peripheral artery disease.
BMC Medical Informatics Decis. Mak., 2022

2021
Development of Home-Based Exercise Mobile Application for Patients with Peripheral Artery Disease.
Proceedings of the Nurses and Midwives in the Digital Age - Selected Papers, Posters and Panels from the 15th International Congress in Nursing Informatics, Virtual Event, 23 August, 2021

2019
Data-Driven Field Mapping of Security Logs for Integrated Monitoring.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Layered Information Structure for Hierarchical Security Management of Critical Infrastructure Using Network Security Appliances.
Proceedings of the HCI International 2019 - Posters - 21st International Conference, 2019

2018
Real-Time Localization for Underwater Moving Object Using Precalculated DC Electric Field Template.
IEEE Trans. Geosci. Remote. Sens., 2018

A software classification scheme using binary-level characteristics for efficient software filtering.
Soft Comput., 2018

2016
An effective and intelligent Windows application filtering system using software similarity.
Soft Comput., 2016

2015
Effective and efficient detection of software theft via dynamic API authority vectors.
J. Syst. Softw., 2015

Machine learning-based software classification scheme for efficient program similarity analysis.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

DAAV: Dynamic API Authority Vectors for Detecting Software Theft.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Efficient Identification of Windows Executable Programs to Prevent Software Piracy.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Identifying Windows Installer Package Files for Detection of Pirated Software.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
A Static Birthmark of Windows Binary Executables Based on Strings.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013


  Loading...